Seven New Security Technologies Coming Out at RSA

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9
Previous Next

Click through for seven new security technologies that are being unveiled at February's RSA Conference.

With the recent wave of high-profile data breaches, including the Target hack, which exposed the credit card data of millions of people, the threat landscape for enterprises and consumers appears gloomy. Whether it is nation-state attacks, cyber criminals or hacktivists, enterprises and consumers remain a constant target, especially with the growth of mobile devices, which bring even more points of entry for cyber crime.

However, help is on the way. This week, the RSA Conference, the IT security industry's largest event, will take place with leading security companies from around the world discussing new strategies and unveiling new technologies designed to help reduce cyber threats and protect against devastating attacks that can cripple a company or wipe out a consumer’s bank account.

Some of the new products and technology being released at RSA are featured in the following slides.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

AlienVaultHowToHackPOS0x From a Hacker's Perspective: How to Breach a Point-of-Sale System

Electronic payments have started to outnumber cash transactions, and hackers have taken notice -- with an increased number of point-of-sale (POS) system breaches making the headlines. ...  More >>

Misc43-190x128 Fifty Start-Ups Disrupting Their Industries

Dell recently announced the new Founders 50 Fall 2014 cohort, which for the first time includes a global contingent representing five countries – the U.S., UK, Canada, France and the Netherlands. ...  More >>

WinMagicHigherEdSecurity0x Data Protection: Five Challenges Facing Today's Educational Institutions

Given the amount of sensitive information colleges and universities store, including student records, coursework and research, it's imperative that they readdress their current security strategies. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.